Cyber threats increase year after year, in the last 12 months, the highest level of cyber incidents in history has been recorded. New and more sophisticated threats, the increase in devices, greater computing power and the large number of professional cybercriminals mean that anyone who has a computer, a smartphone or a device should be concerned about cybersecurity.
These are the five practical tips to guide and help users and companies when it comes to protecting both personal devices and corporate computer systems:
1. Passwords are essential: Passwords need to be changed regularly. It is important that Internet users handle their passwords with care, that they do not store them without security in Excel spreadsheets or leave them written for anyone to see and have varied and robust combinations of 8 characters that at least intersperse letters, symbols and punctuation marks.
2. Protect Yourself Against Phishing: Users Should Be Cautious Before Clicking on Suspicious Links Downloading content from trusted sources is also essential, as phishing, a popular form of social engineering, has become the number one avenue of attack. So if you receive an email with an unusual request or strange sender or subject, don't click.
3. Choose computing devices carefully: In relation to teleworking, this point has become extremely crucial. The risk of a large-scale attack increases when employees use their personal devices, such as computers or mobile phones, for work-related purposes. Security software must be installed on all devices and the connection to the company network must be protected.
4. Keep software up-to-date: Hackers often find entry points into applications, operating systems, and security solutions as they often watch for and exploit vulnerabilities. One of the best protection measures is to always use the latest version of any software, something simple and basic but effective.
5. Use multi-factor authentication: Multi-factor authentication is something many users are already familiar with from their online banking accounts, for example when requesting a TAN (One Time Access Code) via mobile phone. In many cases, this login method is now being introduced to online merchant apps and accounts to increase the security of online information. In this way, they have made it almost impossible for cybercriminals to access the system despite knowing the password.re.
These actions already represent a great advance in the protection of own and company devices against cyberattacks and malware.
However, it should also be complemented by a comprehensive IT security architecture that centrally consolidates and controls various security solutions against different types of attacks. It is important to cover all areas of computer security to intercept even the dreaded Zero-Day attacks. Finally, complete the strategy with the training of all employees up to the management level, including the training of specialists through training b and learning platforms.